OVERVIEW
Risk-based vulnerability management
Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation.
- Eliminate periodic scans with continuous monitoring and alerts. Detect risks even when endpoints are not connected to the corporate network.
- Prioritize the biggest vulnerabilities on your most critical assets using Microsoft threat intelligence, breach likelihood predictions, and business contexts.
- Bridge the gap between security and IT teams to seamlessly remediate vulnerabilities with robust contextual recommendations, built-in workflows, and application block capabilities to enable protection faster.
- Use agent-based or agentless scans across cloud workloads, servers, containers, and endpoints with support for Windows, Linux, macOS, iOS, and Android.
Capabilities
Key capabilities
Proactively reduce risk to your organization with Defender Vulnerability Management.
Detect risks across managed and unmanaged endpoints with built-in modules and agentless scanners, even when devices aren’t connected to the corporate network.
Eliminate periodic scans and access entity-level inventories of devices, software applications, digital certificates, browser extensions, and firmware assessments.
Focus on cyberthreats that pose the highest risk with a single view of prioritized recommendations from multiple security feeds.
Proactively block known vulnerable versions of apps or warn users with customized desktop alerts.
Connect teams with built-in workflows and integrations. Track progress and trends in real time with remediation tracking and device reports.
Get agentless and agent-based vulnerability scanning for agility and comprehensive workload protection.
PLANS AND PRICING
Flexible pricing options
Microsoft Defender Vulnerability Management
Get proactive protection across different domains including endpoints, servers, and cloud workloads with Defender Vulnerability Management.
Get proactive protection across different domains including endpoints, servers, and cloud workloads with Defender Vulnerability Management.
This product is not available in your market.
Vulnerability management plans
- For Microsoft Defender for Endpoint Plan 2 customers: Seamlessly enhance your vulnerability management program—without the need for additional agents—using the Defender Vulnerability Management add-on.
- For Microsoft Defender for Cloud customers: Get agentless vulnerability management for servers, containers, and container registries with Defender Vulnerability Management—natively integrated within Defender for Cloud.
- For other customers: Complement your existing EDR solution with the Defender Vulnerability Management standalone offering.
Products
Related products
Use best-in-class Microsoft security products to help prevent and detect cyberattacks.
Resources
Documentation and latest updates
Get Started
Protect everything
Make your future more secure. Explore your security options today.
Follow Microsoft Security